CFP last date
20 May 2024
Reseach Article

Two Level Image Encryption using Pseudo Random Number Generators

by Vishal Kapur, Surya Teja Paladi, Navya Dubbakula
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 12
Year of Publication: 2015
Authors: Vishal Kapur, Surya Teja Paladi, Navya Dubbakula
10.5120/20200-2446

Vishal Kapur, Surya Teja Paladi, Navya Dubbakula . Two Level Image Encryption using Pseudo Random Number Generators. International Journal of Computer Applications. 115, 12 ( April 2015), 1-4. DOI=10.5120/20200-2446

@article{ 10.5120/20200-2446,
author = { Vishal Kapur, Surya Teja Paladi, Navya Dubbakula },
title = { Two Level Image Encryption using Pseudo Random Number Generators },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 12 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number12/20200-2446/ },
doi = { 10.5120/20200-2446 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:54:36.664969+05:30
%A Vishal Kapur
%A Surya Teja Paladi
%A Navya Dubbakula
%T Two Level Image Encryption using Pseudo Random Number Generators
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 12
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The escalating significance of securing data over the network has encouraged development of secure encryption algorithms. Cryptography is a technique that assists in development of such secure algorithms. It involves converting intelligible data into an unintelligible form to protect it from intruders. In this paper, the authors propose a simple and secure process to secure images. The image encryption process makes use of two Pseudo Random Number generators. In the first step, Linear Feedback Shift Register algorithm is used to swap the rows of the original image. This is followed by the swapping of the columns to produce an intermediary cipher image. In the second step, Blum Blum Shub algorithm is used to substitute the intensity of each pixel of the intermediary cipher image, to produce the final encrypted image. Various analysis tests are then performed to check the quality of the encrypted image. The test results prove the efficiency of the proposed image encryption process.

References
  1. Behrouz A. Forouzan, "Data Communications and Networking", 4th Edition
  2. William Stallings, "Cryptography and Network Security", 5th Edition
  3. Ayushi, "A Symmetric Key Cryptographic Algorithm", International Journal of Computer Applications (0975-8887) Volume 1- No. 15
  4. Arihant Kr. Banthia, Namita Tiwari, "Image Encryption using Pseudo Random Number Generators", International Journal of Computer Applications (0975-8887) Volume 67- No. 20, April 2013
  5. D R Stinson, "Cryptography Theory and Practice", 3rd Edition.
  6. Faheem Masoodi, Shadab Alam, M U Bokhari, "An Analysis of Linear Feedback Shift Registers in Stream Ciphers", International Journal of Computer Applications (0975-8887) Volume 46-No. 17, May 2012
  7. M. Sahithi, B. Murali Krishna, M. Jyoti, K. Purnima, A. Jhansi Rani,N. Naga Sidhu, "Implementation of Random Number Generator Using LFSR for High Secured Multipurpose Applications", International Journal of Computer Science and Information Technologies, Vol. 3(1),3287-3290.
  8. Nishith Sinha, Anirban Bhowmick, Kishore B, "Encrypted Information Hiding using Audio Steganography and Audio Cryptography", International Journal of Computer Applications(0975-8887) Volume 112-No. 5,February 2015.
  9. Shrija Somaraj, Mohammed Ali Hussain, "Securing Medical Images by Image Encryption using Key Image", International Journal of Computer Applications(0975-8887) Volume 104-No. 3, October 2014.
  10. Reshu Choudhary, Arjun JB, "Multimedia Content Security using Image Encryption", International Journal of Computer Applications(0975-8887)
  11. Musheer Ahmad, M. Shamsher Alam, "A New Algorithm of Encryption and Decryption of Images Using Choatic Mapping", International Journal on Computer Science and Engineering, Vol. 2(1),2009,46-50.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Pseudo random number generator Linear Feedback Shift Register Blum Blum Shub Image encryption Image Decryption